Conner Hansen Alex Summer Andreas Floeck Safe Message System.

Slides:



Advertisements
Similar presentations
Design Validation CSCI 5801: Software Engineering.
Advertisements

Efficient Kerberized Multicast Olga Kornievskaia University of Michigan Giovanni Di Crescenzo Telcordia Technologies.
Use Cases for Fault Tolerance Support in MPI Rich Graham Oak Ridge National Laboratory.
A Survey of Key Management for Secure Group Communications Celia Li.
DISTRIBUTED SYSTEMS II FAULT-TOLERANT BROADCAST Prof Philippas Tsigas Distributed Computing and Systems Research Group.
Chapter 19: Network Management Business Data Communications, 5e.
Voice over IP Skype.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Chapter 19: Network Management Business Data Communications, 4e.
SECURITY What does this word mean to you? The sum of all measures taken to prevent loss of any kind.
Eddie Bortnikov/Aran Bergman, Principles of Reliable Distributed Systems, Technion EE, Spring Principles of Reliable Distributed Systems Recitation.
Presented by: Francis Ani & J.R. Armstrong
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Secure Group Communications Using Key Graphs Chung Kei Wong, Member, IEEE, Mohamed Gouda Simon S. Lam, Fellow, IEEE Evgenia Gorelik Yuksel Ucar.
Collaboration Diagrams. Example Building Collaboration Diagrams.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
SafeMessage System Team 4: Luke Skorupski and Matt Roth.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System interfaces Updated: November 2014.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
IMDraw An Instant Message and Drawing Program Tim Poley Kelly Whitacre.
Windows Server WHAT IS ACTIVE DIRECTORY? FUNDAMENTALS OF THE ACTIVE DIRECTORY – Benefits of Using the Active Directory in an Enterprise Environment.
2000 Copyrights, Danielle S. Lahmani UNIX Tools G , Fall 2000 Danielle S. Lahmani Lecture 10.
IMDraw An Instant Message and Drawing Program Tim Poley Kelly Whitacre.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
File Systems (2). Readings r Silbershatz et al: 11.8.
APPX 4.3 Overview. APPX 4.3  System Administration Application Change Management (SCCS) Application Change Management (SCCS) Runtime Process Monitor.
Security and DICOM Lawrence Tarbox, Ph.D. Chair, DICOM Working Group 14 Siemens Corporate Research.
Team ThinkTank. Specifications Ad Hoc networking game. Similar to the Atari Combat! Players control their tank and shoot enemy tanks. Each player gets.
SYSTEM ADMINISTRATION Chapter 7 TCP/IP. Overview (OSI Model Review) The OSI Model is a layered framework that provides structure for data communications.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
RELATIONAL FAULT TOLERANT INTERFACE TO HETEROGENEOUS DISTRIBUTED DATABASES Prof. Osama Abulnaja Afraa Khalifah
1 OSG Accounting Service Requirements Matteo Melani SLAC for the OSG Accounting Activity.
Impact of Topology on Overlay Multicast Suat Mercan.
OOSE Use Case. Requirement Functional: –Features, capabilities, and security Non Functional: –Usability: Human factors, help, and documentation –Reliability:
ACM 511 Introduction to Computer Networks. Computer Networks.
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
Databases JDBC (Java Database Connectivity) –Thin clients – servlet,JavaServer Pages (JSP) –Thick clients – RMI to remote databases –most recommended way.
思科网络技术学院理事会. 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
Kerberos  Kerberos was a 3-headed dog in Greek mythology Guarded the gates of the deadGuarded the gates of the dead Decided who might enterDecided who.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
Maintaining a Cache of Previously Queried Prefixes “Telepathwords: Preventing weak passwords by reading users’ minds.” Saranga Komanduri, Richard Shay,
Chap 7: Consistency and Replication
1 Kerberos n Part of project Athena (MIT). n Trusted 3rd party authentication scheme. n Assumes that hosts are not trustworthy. n Requires that each client.
COMP 424 Computer Security Lecture 09 & 10. Protocol ● An orderly sequence of steps agreed upon by two or more parties in order to accomplish a task ●
Ch 13 Trustworthiness Myungchul Kim
The CoBFIT Toolkit PODC-2007, Portland, Oregon, USA August 14, 2007 HariGovind Ramasamy IBM Zurich Research Laboratory Mouna Seri and William H. Sanders.
Product presentation Pa ul Woodall Jo seph Niehaus Be njamin Kehrer.
Dsitributed File Systems
Integrating Access Control with Intentional Naming Sanjay Raman MIT Laboratory for Computer Science January 8, 2002 With help from: Dwaine.
1 (c) 2013 FabSoft. MOST Cloud Service What is a Cloud Service? A cloud service is internet-based, meaning that MOST is hosted on a server farm on the.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
1 Example security systems n Kerberos n Secure shell.
Keimyung University 1 Network Control Hong Taek Ju College of Information and Communication Keimyung University Tel:
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
Overview of Active Directory Domain Services Lesson 1.
Manajemen Jaringan, Sukiswo ST, MT 1 Network Control Sukiswo
Group policy.
Chapter 19: Network Management
Client/Server Databases and the Oracle 10g Relational Database
Smartcrypt Data Discovery
Ch. 11 – Cipher Techniques Dr. Wayne Summers
7.1. CONSISTENCY AND REPLICATION INTRODUCTION
Firewalls Types of Firewalls Inspection Methods Firewall Architecture
Keeping Member Data Safe
Modular Object Scanning Technology (MOST)
Data Model.
Security network management
Synchronizers Outline motivation principles and definitions
Presentation transcript:

Conner Hansen Alex Summer Andreas Floeck Safe Message System

Use Case Diagram

Utility Tree (1) Security – Session-level encryption (H) – User-level encryption (H) – Unspoofable communication path (H) – User authentication (M) Reliability (Fault Tolerance) – Guarantee delivery of messages (H) – Logging system (L) – Available P2P network (L)

Utility Tree (2) Usage – Selectable security level (H) – Broadcast message (M) – Store message (M) Maintainability – Updatable security algorithms (M) – Updatable network routines (M) – Bugfixes, update system (H) Modifiability – Easy to change GUI (L)

Integrated Security Attributes (Cauliflower)

External Security Class (SecX)

State Diagram: Program

State Diagram: Session

Sequence Diagram: Send Message

Sequence Diagram: Receive Message

What did we learn?